|Publication number||US7962561 B2|
|Application number||US 12/755,343|
|Publication date||Jun 14, 2011|
|Filing date||Apr 6, 2010|
|Priority date||Nov 1, 2000|
|Also published as||US7725546, US20050198176, US20100228831, US20110208653|
|Publication number||12755343, 755343, US 7962561 B2, US 7962561B2, US-B2-7962561, US7962561 B2, US7962561B2|
|Original Assignee||Buyerleverage E-Mail Solutions Llc|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (51), Non-Patent Citations (5), Referenced by (4), Classifications (12), Legal Events (1)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a Continuation of U.S. application Ser. No. 11/037,469, filed Jan. 19, 2005, which claims priority from Provisional Application U.S. Application 60/539,271, filed Jan. 27, 2004 and which is also a Continuation-In-Part of U.S. application Ser. No. 09/984,884, filed Oct. 31, 2001, which claims priority from Provisional Application U.S. Application 60/244,609, filed Nov. 1, 2000 . All these applications are incorporated herein by reference in their entirety.
The present invention relates generally to the field of network and Internet communications, and more particularly to the field of automatic Email control.
Jupiter Media Metrix predicts that the average Email address will receive 40 times as many Emails as it is receiving now by the year 2005. Even at current levels, consumers show a concern about protecting their Email inboxes against unwanted Email (hereafter referred to as “spam”). At the same time consumers must constantly relinquish their Email address to third parties in the course of availing themselves of the many products and services that are offered on the Web. Individuals also find it necessary or useful to communicate with many private individuals by Email temporarily, yet do not necessarily wish to grant these individuals long-term access to their Email inbox. But reviewing and discarding commercial Emails takes time and effort and many individuals resent their inability to shield themselves against this unwanted intrusion.
Many people like or need to be immediately notified when Emails come in, and enable features in their Email application that provide them with visual or auditory signals to alert them of an incoming Email. To those individuals the unwanted interruption of unwanted Email is even more bothersome. In addition, wireless devices have limited screen space, lower memory storage and longer download times, which all work to increase the productivity costs of unwanted Email.
A key problem which results from spam is that people are reluctant to publish their Email addresses in publicly available directories. Indeed, individuals who list their Email address in a public directory are likely to receive many additional unwanted commercial Emails. Spammers can simply retrieve their Email address from these public listings and use them to send commercial Email messages. Consumers who evade these spammers by declining to list their Email address in a public directory, also make their Email address unavailable to those who do not have their Email address, but might have a legitimate interest in contacting them. Contacting people by telephone is not always possible, because many numbers are not listed or otherwise not available. Even when it is possible, contacting people by phone to ask them for their Email address is inconvenient.
None of the current technologies and methods which allow consumers to protect themselves against unwanted Email, hold the promise of combating spam effectively enough to allow consumers to publish their Email addresses publicly. Such technologies described as follows:
Opt-In and Unsubscription
Some businesses especially those that regularly send third party advertisements by Email to a group of opt-in Email subscribers allow these subscribers to opt-out by replying to an Email or clicking on a link in the Email. However many companies do not. In addition, of the companies that do
Most importantly, even if a majority of companies voluntarily refrain from sending volume Emails, and take proper safeguards against unauthorized disclosure, advances in technology allow even a small group of spammers to send many hundreds of millions of unwanted Emails and to sell Email addresses to other spammers.
Legislation which would mandate that companies abide by the privacy policies that they publish may be passed in the future, but no legislation that generally prohibits sending Email to individuals who have not expressly given permission to receive such Email is expected due to first amendment concerns. Also any legislation would be difficult to enforce on the Internet due to its global reach and the ability to send Email messages from virtually anywhere outside the United States.
Hotmail and other Email providers allow consumers to “block senders” i.e. to block Emails coming from a particular Email address/outbox. However, senders can change their outgoing Email address at will so that this mechanism is not effective.
Some providers also refer Emails that are sent to multiple recipients on the same network to a separate Bulk Email folder. The problems with this mechanism are
Yet another method of protecting consumers against unwanted Email is the blacklisting of senders and their IP addresses. Programs exist that block Emails from blacklisted senders. Internet service providers such as Abovenet and UUnet exercise pressure on their business consumers to adopt strict opt-in Email policies. But as noted above, spammers can switch internet service providers and/or Email addresses to evade detection and blocking of their Emails.
Yet another method of protecting consumers against unwanted Email is for the content of the Emails to be screened by artificial intelligence based software programs. Depending on the content and which words or phrases are found in the Email, Emails are then either blocked or routed to less important folders which the user is presumed to check less frequently. The problems with this method are
Briefly, the present invention comprises in one embodiment, an Email guarantee deposit method, comprising the steps of: receiving from a sender a request to send to a recipient an Email; receiving a deposit or an authorization to obtain a deposit of something of value; sending the Email to the recipient only if a deposit of authorization for a deposit is received; determining if the recipient has accepted the deposit; and if the recipient has accepted the deposit, then facilitating the disposal of the deposit.
In a further aspect of the present invention, the facilitating step includes the step of exercising the authorization to obtain the deposit.
In a further aspect of the present invention, the step is provided of maintaining a directory of Email addresses; and obtaining an Email address for the recipient from the directory.
In a further aspect of the present invention, the steps are provided of: before the sending step, correlating the deposit with a threshold value set by the recipient; and only performing the sending step if the deposit equals or exceeds the threshold value set by the recipient.
In a further embodiment of the present invention, an Email address access method is provided, comprising the steps of: receiving from a sender a request to send to a recipient an Email; receiving a payment or an authorization to obtain a deposit of something of value; determining if the deposit equals or exceeds a threshold value; and if the payment equals or exceeds the threshold payment, then sending the Email to the recipient.
In a further aspect of the present invention, the step is provided of sending at least part of the threshold payment to the recipient.
In a further embodiment of the present invention, a program product is provided for an Email guarantee deposit method, comprising machine-readable program code for causing a machine to perform the following method steps: receiving from a sender a request to send to a recipient an Email; receiving a deposit or an authorization to obtain a deposit of something of value; sending the Email to the recipient only if a deposit of authorization for a deposit is received; determining if the recipient has activated the deposit; and if the recipient has accepted the deposit, then facilitating the disposal of the deposit.
In a further embodiment of the present invention, an Email guarantee deposit system is provided, comprising: a component for receiving from a sender a request to send to a recipient an Email; a component for receiving a deposit or an authorization to obtain a deposit of something of value; a component for sending the Email to the recipient only if a deposit of authorization for a deposit is received; a component for determining if the recipient has accepted the deposit; and a component for, if the recipient has accepted the deposit, then facilitating the disposal of the deposit.
In a further embodiment of the present invention, an Email guarantee deposit method is provided, comprising the steps of: receiving from a sender a request to send to a recipient an Email with a visual or auditory signal or with other emphasis or to route the Email to designated type of device; receiving a deposit or an authorization to obtain a deposit of something of value; sending the Email to the recipient with such a visual or auditory signal or other emphasis or routing the Email to the designated type of device only if a deposit of authorization for a deposit is received; determining if the recipient has accepted the deposit; and if the recipient has accepted the deposit, then facilitating the disposal of the deposit.
In a further embodiment of the present invention, an Email address access method is provided, comprising the steps of: receiving from a sender a request to send to a recipient an Email with a visual or auditory signal or with other emphasis or routed to a designated type of device; receiving a payment or an authorization to obtain a deposit of something of value; determining if the deposit equals or exceeds a threshold value; and if the payment equals or exceeds the threshold payment, then sending the Email with said signal or emphasis to the recipient.
In a further embodiment of the present invention, a program product is provided for an Email guarantee deposit method, comprising machine-readable program code for causing a machine to perform the following method steps: receiving from a sender a request to send to a recipient an Email with a visual or auditory signal or with other emphasis or routed to a designated type of device; receiving a deposit or an authorization to obtain a deposit of something of value; sending the Email with said signal or emphasis to the recipient only if the deposit or authorization for the deposit is received; determining if the recipient has activated the deposit; and if the recipient has accepted the deposit, then facilitating the disposal of the deposit.
In a further embodiment of the present invention, an Email guarantee deposit system is provided, comprising: a component for receiving from a sender a request to send to a recipient an Email with a visual or auditory signal or with other visual emphasis or routing to a designated type of device; a component for receiving a deposit or an authorization to obtain a deposit of something of value; a component for sending the Email with said visual or auditory signal or emphasis to the recipient or routing the Email to the designated device; a component for determining if the recipient has accepted the deposit; and a component for, if the recipient has accepted the deposit, then facilitating the disposal of the deposit.
The present invention solves the foregoing problems, in one embodiment, by allowing users/potential recipients to grant others the right to send the users Emails on the condition that any sender of an Email pays a fee in the event that the user/recipient considers the Email to be an unwanted intrusion. This fee will deter most senders of unwanted commercial Emails (“spam”).
Users who wish to grant others access to their Email inbox, publish a permanent “intermediary” Email address which is different from their primary Email inbox. The term “intermediary Email box” is intended to be construed broadly to include any kind of conceivable device or receiving area, with or without storage, that processes an incoming message and rejects the message or rejects a request for additional mailing rights if the message does not come with a requisite deposit.
Alternatively, instead of publishing an intermediary address, users could simply publish a link at a website through which others could have access to that intermediary Email address by clicking on it and typing the text of the Email into a pre-set form.
Emails received at the intermediary inbox are forwarded to the recipient's primary Email address only if the sender insures the mailing with a deposit or an authorization for a deposit of something of value. There may be a threshold pre-set by the user/recipient or the system and published with his/her Email address, which must be met. The recipient can waive or accept payment of this deposit fee at his option, or the deposit can be made automatically.
The directory aspect of the present invention can also be setup for the explicit purpose of inviting senders to pay for access to the user's Email inbox. Note that in a preferred embodiment, the user's primary Email address is never disclosed during the process.
Another embodiment of the present invention allows the mailing to a transit Email address even without a guarantee deposit but only for the purpose of requesting mailing rights and subject to strong restrictions regarding the amount of text in the message: The system could be set to allow the requestor to only input his name, the standard request for mailing rights itself and, possibly, a very limited number of words (in one embodiment, not more than 3 to 5 words in a confined space) that will help the recipient recognize the sender in the event the recipient does not recognize the sender by his name alone (for instance, “Schwab investment advisor met yesterday” would let the recipient know that the person requesting the mailing rights is the Schwab Corporation Investment Advisor whom he/she met at a party on October 30 and to whom he/she had expressed an interest in learning more about potential investments.) Such a request would be made in a pre-set format. This mechanism would allow non-spammers to make such requests for mailing rights while restricting the ability of spammers to use the directory to send commercial messages.
Another way of implementing the invention is to allow users to specify that they only wish to receive Emails without a deposit from a certain list of pre-determined Email addresses. By default, Emails that arrive from any other Email address are sent back to the sender with a notice that they must be insured in the above described manner before they will be relayed to the primary Email inbox of the recipient. If the sender then insures the Email, the recipient could have the additional option of adding the senders' Email address to his/her list of approved Email addresses from which he/she can receive Emails even if they are not insured. In this manner of using the invention, a user would be able to freely and widely publish his primary Email address rather than a secondary Email address without fear of receiving excessive spam.
Yet another implementation of the invention is to make other or additional mailing rights contingent on the submission of a deposit. Separately or additionally, deposits would be required to send an Email that is not only placed in the Email inbox of a recipient but that alerts the recipient of a particularly urgent communication at the time that the Email arrives in the Inbox with an auditory or visual signal. Alternatively, Emails that are insured in this manner with a special deposit could be visually emphasized or ranked higher in a particular Email inbox so as to be read first and be more likely to command the attention of the recipient. Similarly, to the other implementation methods above, the recipient would have the option of accepting the deposit in the event that he or she deems the interruption or the additional emphasis inappropriate, intrusive or unjustified. A deposit could also be required to route an Email to the handheld personal digital assistant or to the cellular phone of the recipient instead of to the regular Email inbox which he normally accesses through his computer. To route an Email to a hand-held device such as a PDA or a Cell phone or to add auditory or visual interruption signals, a particular recipient would presumably require higher deposits than those that are required for the mailing of a regular Email that goes to the standard Email inbox. Note that such additional contingent mailing rights do not have to be granted indiscriminately to anyone willing to make the required deposit, but could be made available selectively to certain groups of individuals, such as those working at a particular company.
Referring now to
In a preferred embodiment, the communications network 20 is the Internet. The term “Internet” is defined to mean a collection of interconnected or disconnected networks (public and/or private) that are linked together by a set of standard protocols (such as TCP/IP, for example) to form a global, distributed network. While this term is intended to refer to what is now commonly known as the Internet, it is also intended to encompass variations which may be made in the future, including changes and additions to existing standard protocols.
However, the communications network 20 can also include a wide area network (WAN), an internet network, a public tariff telephone network or a private value added network (VAN). Alternatively, the communication network can be implemented using any combination of these different kinds of communication networks. It will be appreciated that many other similar configurations are within the abilities of one skilled in the art and all of these configurations could be used with the method of the present invention. Furthermore, it should be recognized that the computer system and network disclosed herein can be programmed and configured in a variety of different manners by one skilled in the art, to implement the method steps discussed further herein.
The client blocks 10 in
If the blocks 10 are implemented as computers, they would typically include customary components of a computer system including a CPU, a display, a keyboard and/or other I/O device, a network card or other communications interface, RAM or ROM or other memory, as well as storage such as disks and/or CDROM drives. (However, the client may be other browser equipped or communication program equipped devices as described above.) The monitor may be any conventional off-the-shelf monitor. The preferred operating system is Windows 2000 or XP. As noted in the preferred embodiment, within each personal computer, an internet browser such as Netscape or Internet Explorer is stored for use. Also in the preferred embodiment, the browser is linked to network 20 via the TCP/IP protocol stack.
Likewise, the blocks 40 representing the vendors and others wishing to communicate with the clients 10, will also typically be implemented by means of a computer, but could be implemented by hand held devices or other convenient devices.
The processor 30 is representative only, and may be comprised of a single processor. Alternatively, the functionality of the processing system could be implemented with several processor systems that are connected over a network. It is also possible to distribute the functionality of the processing system over a multitude of sites which are suitably connected together using conventional networking or inter-networking techniques.
In a preferred embodiment, the Email system of the present invention may be provided by a web service which includes the processor 30. The term “web service” is intended to refer to a service that is provided (at least in part) by a web server. But a web service is a broader concept than a web server. In this regard, a web server is a program that, utilizing the client/server model and the World Wide Web Hypertext Transfer Protocol, serves files that form Web pages to web users whose computers contain HTTP clients that forward their requests. Every computer on the Internet that contains a Web site must have a Web server program. The most popular web servers currently are Microsoft's Internet Information Server which comes with the Windows NT server, Netscape Fast Track and Enterprise servers, and Apache, a Web server popular on UNIX-based operating systems (but available for Windows as well). Web servers often come as part of a larger package of Internet and Intranet-related programs for serving e-mail, downloading requests for File Transfer Protocol files, and building and publishing Web pages. It is this larger package which is referred to as the web service.
Typically a web service will include a Web site which corresponds to a particular Internet domain name, such as “Landesmann.com”, and includes the web content associated with one or more particular operations. The term “Web site” is generally intended to encompass both (i) the hardware/software server components that serve informational content over the network, and (ii) the “back end” hardware/software components, including any non-standard or specialized components, that interact with the server components to perform services for the Web site user.
Referring now to
The process may be initiated by a sender obtaining an Email box address for a particular user/recipient. This might be a secondary intermediary Email address of the recipient which the recipient has made available directly or indirectly to the sender, and which is different from the recipient's primary Email address. The sender sends the Email to this address. This is illustrated by block 200. In block 202, the Email box system receives this Email from the sender and instead of placing or forwarding the Email into the inbox of the recipient, sends in response an Email requesting a deposit or an authorization for a deposit. Typically, this deposit will be for a pre-set threshold amount.
In block 204, the sender sends an Email with a deposit or a deposit authorization in a preset format. Note that the term “Email” is intended to encompass any type of network communication. The sender would send his Email to the intermediary Email box at the processor 30, which effectively acts as a bridge or triage and transit station for the Email, and operates to relay the Email to the sender under certain conditions, but not under other conditions. Note that after the sender has the correct intermediary Email box address and the correct threshold amount and any pre-set format for the communication, blocks 200 and 202 can be bypassed when the sender wishes to send another Email to the same recipient.
In block 210, the intermediary Email box receives the Email from the sender. This block 210 includes one or more subsidiary steps. As noted, the system is set up with a pre-set threshold deposit requirement. This pre-set threshold deposit requirement may be a standard deposit value set by the system. Alternatively, the pre-set deposit value could be set by the user/recipient. In the situation where the user/recipient has pre-set the threshold value for the deposit, in block 220 the user's pre-set threshold must be obtained. Typically, the user's pre-set threshold value would be associated with the user's intermediary Email address. Alternatively, the user's intermediary Email address could be used as a reference to access this pre-set threshold value.
Accordingly, the block 210 would determine whether the deposit or the authorization for the deposit is for a value which equals or exceeds the threshold value which has been pre-set by the user/recipient or the system. Another optional step could be performed in block 210 if the intermediary Email box is provided with an expiration date. In this instance, the date of the sender's Email could be compared with the expiration date of the intermediary Email box, and the process would continue only if the sender's Email date is prior to the expiration date of the intermediary Email box.
Note that block 210 could also include a subsidiary step of comparing the sender's Email address to a list of Email addresses that the recipient will accept without the payment of a deposit. Accordingly, the deposit process can be bypassed for a selected set of senders designated by the recipient. The populating of such a list of senders could be accomplished during the setup of the intermediary Email box by the recipient, and may also be performed on an ad hoc basis as the recipient determines that this privilege should be extended to a new sender.
Senders who frequently send Email to intermediary Email boxes could keep a copy of the form that is sent by the intermediary web site on their hard drives or in other convenient storage so that this form could be pre-completed with payment information (credit card or micro payment account, for example). This pre-completed payment form would speed-up the process of sending of Emails. Alternatively, the sender's Email outbox could be linked to an account of the sender held by the company administering the intermediary Email box service. This account could be automatically debited whenever the sender makes a request to send an Email to a recipient through this intermediary Email box.
In block 220, the deposit or an authorization for a deposit of something of value, typically money, is received at the intermediary Email site. The deposit could be by means of a credit card number or a debit card number, for example. Note that the recitation “intermediary” Email box in this context is also intended to encompass other designated locations where the deposit or the authorization for the deposit might be sent, with a verification message sent to the intermediary Email box.
In block 230, if it has been determined that the deposit or the authorization for the deposit does not equal or exceed the pre-set threshold or if the deposit or authorization for deposit cannot be verified, then a message is sent to the sender informing him/her of the deficiency in his/her deposit and requesting a resubmittal of a new deposit.
Alternatively, if the deposit or authorization for the deposit has been verified and does equal or exceed any optional pre-set threshold value, then in block 240 the Email is sent to the primary inbox of the recipient.
In the event that other mailing rights are authorized as the result of the deposit, such as routing the Email to the personal digital assistant or cell phone of the recipient or alerting the recipient with a visual or auditory signal, the particular action that has been authorized as a result of the deposit is then taken in block 240.
In block 250, the recipient opens his Email. In block 260, the recipient decides whether to accept or decline the guaranteed deposit payment. In order to implement this step, by way of example the forwarded Email could be provided with web content to display buttons labeled “Accept” and “Decline,” with hyperlinks to appropriate network locations.
Referring to block 270, if the user clicks the “Accept” button, then the deposit may be debited. Note that the debiting of the deposit may be made to the user/recipient's account, or to any other selected account. By way of example, the debit could be made to a charity, for example.
Alternatively, if the user/recipient clicks the button “Decline”, then in block 280 the sender's deposit or authorization for deposit may be canceled.
In block 290, the system automatically sends a message to the sender notifying the sender of the recipient's acceptance or cancellation decision for the deposit.
It should be noted that a default decision may be set by the user for deposits in block 260. In this regard, the default could be set to automatically accept all deposits. Alternatively, the default could be set to automatically decline all deposits.
Referring now to
Referring now to block 320, the user selects the amount of the deposit to be requested from potential senders. In one aspect of the implementation for block 320, the user could provide different deposit requirements for different senders, or different types of senders. For such an implementation, block 320 would provide web content for receiving input from the user for a plurality of deposit threshold values, and the senders or type of senders that those different threshold values would apply to. For example, the user may require a different higher deposit before an auditory or visual enhancements may be activated by a sender. The user may set an even higher deposit threshold to be paid before routing to the user's cell phone or PDA may be activated by a sender.
Note that if an enhanced version of the system is set up for the user/recipient, wherein different levels of threshold deposit values have been set for different senders or different types of senders, then when an Email from a sender is received by the intermediary Email box system, then in block 202 the intermediary Email box system determines the appropriate threshold deposit level for that particular sender or class of senders by means of comparison to a table of senders or via another convenient method, and then sends the appropriate threshold deposit level information back to the sender. The appropriate threshold deposit level is then used in block 210 to determine whether the deposit amount or authorization for the deposit sent by the sender equals or exceeds this threshold deposit value.
In block 340, the user inputs a description of himself/herself and the user's background. This information may be used for the purpose of distinguishing between several people with the same or similar names, so that a user of the Email will not send an Email to a person other than the intended recipient. At the option of the user/recipient, this information could also be used for other market-driven purposes.
In block 350, the user may be prompted by web content on his browser to enter a list of exempted senders, who would be exempted from the deposit requirements. In this block or an earlier block the user may select an intermediary Email box address or may be given an intermediate Email address by the system.
In block 360, the user would then save this information and log off.
Referring now to
In more detail, these Email enhancement in block 408 might include web content to provide a screen or other user interface for offering a method of alerting the recipient of the particular Email with an auditory and/or visual signal, which would be presented to the user at a convenient time, typically during processing of the user's Email. For example, program code could be added to cause an auditory beep or other sound or words to be made at a predetermined time to the user, and/or a highlighting of the Email visually, or the addition of words, or icons, or designs to indicate urgency for this particular Email. Alternatively or in addition, the Email could be ranked higher in the Email box so as to be read earlier than its receipt time would entitle it. Alternatively, or in addition, a selection screen could be presented to sender to route the Email additionally to or only to another Email receiving device, such as a hand-held device like a PDA or a cell phone, with or without auditory or visual enhancement. As noted above, additional deposits or different deposits may be required for adding one or more Email enhancements or for routing the Email to selected other devices, such as hand-held devices.
Alternatively, note that the present invention may also be set up to pass all Emails to the recipient, with enhancement of the Email or the routing of the Email to selected other devices only occurring if the requisite deposit is received.
If the sender accepts the deposit requirements by making the appropriate indications on his screen, then in block 412, the sender is presented by the appropriate web content, with a screen to provide account information for making payments of the deposit or providing an authorization to obtain a deposit.
In block 414, the sender then composes his/her Email and in block 416, the sender sends the Email which—assuming that the deposit is sufficient—is relayed to the Email inbox of the desired recipient. In the event that other mailing rights are authorized as the result of the deposit, such as routing the Email to the personal digital assistant or cell phone of the recipient or alerting the recipient with a visual or auditory signal, then in block 416 program code is added to facilitate at the appropriate time the particular action that has been authorized as a result of the deposit.
The operation of blocks 450, 460, 470, 480, and 490, may be substantially as described for
Note that the option for enhanced Email described above for
As noted earlier, the insurance deposit payment generally will be paid to the recipient in the event that he accepts the payment but that is not necessarily the case. The payment could also go to charity or to another third party on whose behalf the recipient could accept the deposit. The main purpose of the deposit is to deter senders of unwanted commercial Emails from using the directory.
As noted above, people are reluctant to publish their Email addresses in publicly available directories. In accordance with one embodiment of the present invention, individuals may publish a permanent or temporary “intermediary” Email address which is different from their primary Email inbox. Emails going to that intermediary inbox are forwarded to the recipient's primary Email address only if the sender insures the mailing with a deposit fee, at a threshold set by the recipient or the system and published with his/her Email address. The recipient can waive this fee at his/her option.
The directory aspect of the present invention can also be setup for the explicit purpose of inviting senders to pay for access to one's Email inbox. Prominent individuals and community leaders can make their Email inboxes (and by extension, themselves) available for a fee.
Another embodiment of the directory aspect of the present invention is that it allows mailing to an intermediary Email address even without a guarantee deposit but only for the purpose of requesting mailing rights and subject to strong restrictions regarding the amount of text in the message: The requestor can only give his name, a standard request for mailing rights itself and, possibly, a very limited number of words (probably not more than 3 to 5 words) that will help the recipient recognize the sender for those situations where the recipient does not recognize the sender by his/her name alone (for instance, “Schwab investment advisor met yesterday,” would let the recipient know that the person requesting the mailing rights is the Schwab Corporation Investment Advisor whom he/she met at a party on October 30 and to whom he/she had expressed an interest in learning more about potential investments.) Such a request would be made in a pre-set format. This mechanism would allow non-spammers to make such requests for mailing rights while restricting the ability of spammers to use the directory to send commercial messages.
Referring to the user's creation of an “Accepted” list, where the user designates a certain list of predetermined senders/callers or addresses or for the purpose of allowing emails emanating from these sender addresses to be relayed to the user's inbox even when they do not carry a deposit or deposit authorization (note that, similar to the broad definition of the word ‘email’ as encompassing all communications, the terms caller or sender are used interchangeably in this application to designate the person initiating a communication or communication attempt), this can be created as follows. The creation of such an accepted list can be automated in many ways, one of which is to allow the user to automatically and by default add anyone in his address book to the Accepted List.
This could be additionally supplemented with other rule-based determinations of Email addresses or Email domains or addresses or senders from which the user would be willing to accept those emails or other communications or communication initiations and/or audio/visual interruptions that are non-insured with a sender deposit.
For instance, user A could accept all communications from email addresses to which user A has sent an email in the last 12 months. By way of example, the rules for determining whether a particular sender email address should be added to such an accepted list could be based on one or more of the following type of criteria:
1. Whether one or more emails initiations were sent by the user to that sender email address or sender domain or to a similar email address or domain;
2. The length of these outgoing emails/communication/communication initiations.
3. Whether or not these emails/communication/communication initiations were sent in an anonymized manner i.e. with the return address and other personally identifiable information hidden by the user or not. (including whether they were signed with such information or not)
4. Whether one or more emails/communication/communication initiations were sent to that address or number or email address or domain or to a similar address or number or email address or domain by other trusted emailers/communicaters as designated by the user himself. This presumes that these other communicators are willing to share their information with each other or at least with the user for this purpose.
In particular, a user could automatically allow for the addition of those email addresses that are on the Accepted Lists of those who are on her accepted list, or go even a degree further, and allow for the addition of those addresses that are on the Accepted List of those who are on the Accepted List of those who are on the Accepted list of the user. This concept could be extended to additional degrees similar to the way rights are administered in social networking models such a Friendster or Orkut. Note that although users would have to be willing to allow for the use of their accepted list for this purpose, such accepted lists could be stored in a trusted server maintained by a trusted entity, and used to filter emails accordingly prior to relegation of some of the emails to the recipient. Therefore, it is not necessary that users share their accepted list with those whose use of their accepted list they authorize for this purpose.
5. The frequency and length of the communications listed in 4.
6. The rating of the sender as determined in various ways known in the art today. (Reputation, prior record as sender of emails, and other information that may be available.)
At least three of the aforementioned techniques for regulating access to a user's inbox can also be combined building a wall or shield protecting the user against unwanted interruptions and communications: 1 deposit/insurance; 2 ‘manual’ designation of addresses that do not require a deposit by the user; 3 automated rule-based designation of such addresses. (1 with 2; and 1 with 2 and 3)
It should be noted that although the flow charts provided herein show a specific order of method steps, it is understood that the order of these steps may differ from what is depicted. Also two or more steps may be performed concurrently or with partial concurrence. Such variation will depend on the software and hardware systems chosen, and more generally, on designer choice. It is understood that all such variations are within the scope of the invention. Likewise, software and web implementation of the present invention could be accomplished with standard programming techniques with rule based logic and/or other logic to accomplish the various database searching steps, correlation steps, comparison steps and decision steps. It should also be noted that the word “component” as used herein and in the claims is intended to encompass implementations using one or more lines of software code, and/or hardware implementations, and/or equipment for receiving manual inputs.
The foregoing description of a preferred embodiments of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive nor to limit the invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. The embodiments were chosen and described in order to explain the principals of the invention and its practical application to enable one skilled in the art to utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto, and their equivalents.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4935956||Apr 20, 1989||Jun 19, 1990||Telequip Ventures, Inc.||Automated public phone control for charge and collect billing|
|US5508817||Mar 19, 1993||Apr 16, 1996||Fujitsu Limited||Electronic mail accounting system|
|US5764899||Dec 19, 1995||Jun 9, 1998||Motorola, Inc.||Method and apparatus for communicating an optimized reply|
|US5794210||Dec 11, 1995||Aug 11, 1998||Cybergold, Inc.||Attention brokerage|
|US5828737||Oct 24, 1995||Oct 27, 1998||Telefonaktiebolaget L M Ericsson||Communications service billing based on bandwidth use|
|US5855008||Aug 28, 1997||Dec 29, 1998||Cybergold, Inc.||Attention brokerage|
|US5930479||Oct 21, 1996||Jul 27, 1999||At&T Corp||Communications addressing system|
|US5999967||Aug 17, 1997||Dec 7, 1999||Sundsted; Todd||Electronic mail filtering by electronic stamp|
|US6023723||Dec 22, 1997||Feb 8, 2000||Accepted Marketing, Inc.||Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms|
|US6052709||Dec 23, 1997||Apr 18, 2000||Bright Light Technologies, Inc.||Apparatus and method for controlling delivery of unsolicited electronic mail|
|US6072942||Sep 18, 1996||Jun 6, 2000||Secure Computing Corporation||System and method of electronic mail filtering using interconnected nodes|
|US6101485||Mar 26, 1998||Aug 8, 2000||International Business Machines Corporation||Electronic solicitations for internet commerce|
|US6101531||Apr 15, 1998||Aug 8, 2000||Motorola, Inc.||System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client|
|US6167434||Jul 15, 1998||Dec 26, 2000||Pang; Stephen Y.||Computer code for removing junk e-mail messages|
|US6192114||Sep 2, 1998||Feb 20, 2001||Cbt Flint Partners||Method and apparatus for billing a fee to a party initiating an electronic mail communication when the party is not on an authorization list associated with the party to whom the communication is directed|
|US6199102||Aug 26, 1997||Mar 6, 2001||Christopher Alan Cobb||Method and system for filtering electronic messages|
|US6209095||Aug 31, 1999||Mar 27, 2001||Financial Services Technology Consortium||Method and system for processing electronic documents|
|US6249805||Aug 12, 1997||Jun 19, 2001||Micron Electronics, Inc.||Method and system for filtering unauthorized electronic mail messages|
|US6393464||May 10, 1999||May 21, 2002||Unbound Communications, Inc.||Method for controlling the delivery of electronic mail messages|
|US6421709||Jul 7, 1999||Jul 16, 2002||Accepted Marketing, Inc.||E-mail filter and method thereof|
|US6484197||Feb 11, 1999||Nov 19, 2002||International Business Machines Corporation||Filtering incoming e-mail|
|US6587550||Feb 14, 2001||Jul 1, 2003||Michael O. Council||Method and apparatus for enabling a fee to be charged to a party initiating an electronic mail communication when the party is not on an authorization list associated with the party to whom the communication is directed|
|US6697462||Apr 10, 2002||Feb 24, 2004||Vanguish, Inc.||System and method for discouraging communications considered undesirable by recipients|
|US6741969||May 30, 2000||May 25, 2004||Murray Huneke||System and method for reducing excess capacity for restaurants and other industries during off-peak or other times|
|US7072942||Feb 4, 2000||Jul 4, 2006||Microsoft Corporation||Email filtering methods and systems|
|US7072943||Oct 31, 2001||Jul 4, 2006||Buyerleverage Email Solutions Llc||System and method for granting deposit-contingent E-mailing rights|
|US7280982||Apr 4, 2000||Oct 9, 2007||International Business Machines Corporation||System and method for a fee address system|
|US7293065||Nov 18, 2003||Nov 6, 2007||Return Path||Method of electronic message delivery with penalties for unsolicited messages|
|US20010023432||Feb 14, 2001||Sep 20, 2001||Council Michael O.||Method and apparatus for enabling a fee to be charged to a party initiating an electronic mail communication when the party is not on an authorization list associated with the party to whom the communication is directed|
|US20020052855||Oct 31, 2001||May 2, 2002||Mark Landesmann||System and method for granting deposit-contingent e-mailing rights|
|US20020165898||Apr 4, 2002||Nov 7, 2002||Joe Duffy||Recipient-determined method for sharing tasks in an advanced electronic messaging/workflow system|
|US20020169954||Jun 22, 2001||Nov 14, 2002||Bandini Jean-Christophe Denis||Method and system for e-mail message transmission|
|US20030009285||Jun 28, 2001||Jan 9, 2003||Picone J. Michael||Similarity transformation method for data processing and visualization|
|US20030023736||Jul 9, 2002||Jan 30, 2003||Kurt Abkemeier||Method and system for filtering messages|
|US20030086543||Apr 10, 2002||May 8, 2003||Raymond Philip R.||System and method for discouraging communications considered undesirable by recipients|
|US20030114157||Dec 14, 2001||Jun 19, 2003||David Spitz||Systems, methods, and computer program products for registering wireless device users in direct marketing campaigns|
|US20040122730||Jan 2, 2001||Jun 24, 2004||Tucciarone Joel D.||Electronic messaging system and method thereof|
|US20040165707||Feb 23, 2004||Aug 26, 2004||Raymond Philip R.||System and method for discouraging communications considered undesirable by recipients|
|US20040230531||Mar 15, 2004||Nov 18, 2004||Harold Weiss||System for handling electronic messages with the senders' financial guarantee|
|US20050086365||Mar 19, 2004||Apr 21, 2005||Frank Urro||System for adaptive bonding level for e-mail messages|
|US20050144244||Feb 18, 2005||Jun 30, 2005||Buyerleverage||System and method for granting deposit-contingent e-mailing rights|
|US20050192819||Feb 27, 2004||Sep 1, 2005||Smith Michael D.||Method and system for reducing unsolicited messages using variable pricing and conditional redemption|
|US20050193075||Feb 16, 2005||Sep 1, 2005||Hyperspace Communications, Inc.||Method, apparatus and system for regulating electronic mail|
|US20050198174||Dec 30, 2004||Sep 8, 2005||Loder Theodore C.||Economic solution to the spam problem|
|US20050198176||Jan 19, 2005||Sep 8, 2005||Buyerleverage Email Solutions Llc||System and method for granting deposit-contingent e-mailing rights|
|US20060026107||Jul 29, 2004||Feb 2, 2006||Frank Urro||Mechanisms for waiving or reducing senders' liability in bonded electronic message systems while preserving the deterrent effect of bonds|
|US20060036690||Jul 12, 2004||Feb 16, 2006||O'neil Patrick J||Network protection system|
|US20060080395||Jul 29, 2005||Apr 13, 2006||Mark Landesmann||System and method for granting deposit-contingent e-mailing rights|
|US20070022007||Jun 14, 2006||Jan 25, 2007||Mystorecredit.Com||System and method for a customer loyalty reward system utilizing a shopping search portal, a payment transfer agent and email marketing|
|US20070083433||Sep 29, 2006||Apr 12, 2007||Lawe Tabbatha C||System and method for sellers to reward buyer opt-in and repeat purchases using payment transfer agent coupons codes|
|WO1999029099A2||Nov 30, 1998||Jun 10, 1999||Rossides Michael T||Systems for using prices to screen e-mail|
|1||Dwork, C. et al., "Pricing Via Processing or Combatting Junk Mail," pp. 1-11.|
|2||Ismail, Shawki S.; Notice of Allowance on U.S. Appl. No. 11/037,469 mailed Mar. 22, 2010; 12 pages; US Patent and Trademark Office.|
|3||Krishnamurthy et al., "SHRED: Spam Harassment Reduction via Economic Disincentives," AT&T Labs-Research, Eureka! Computing Solutions, Inc., pp. 1-14.|
|4||Nail et al., "The Real Answer to the Spam Problem," Whole View, Tech Strategy Research, Dec. 10, 2003, pp. 1-5.|
|5||Technical Forum, IBM Systems Journal, vol. 41, No. 4, 2002, pp. 759-766.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8868653 *||Dec 23, 2010||Oct 21, 2014||Intel Corporation||Peer discovery and connection management based on context sensitive social networks|
|US20090328161 *||Sep 2, 2009||Dec 31, 2009||Puthenkulam Jose P||Peer discovery and connection management based on context sensitive social networks|
|US20110099274 *||Dec 23, 2010||Apr 28, 2011||Puthenkulam Jose P||Peer discovery and connection management based on context sensitive social networks|
|US20110173283 *||Mar 25, 2011||Jul 14, 2011||Puthenkulam Jose P||Peer discovery and connection management based on context sensitive social networks|
|U.S. Classification||709/206, 709/207|
|Cooperative Classification||G06Q40/00, G06Q20/40, G06Q10/107, H04L51/12|
|European Classification||G06Q40/00, H04L12/58F, G06Q20/40, G06Q10/107, H04L51/12|